]> git.pld-linux.org Git - packages/exim.git/blame - exim4.conf
- pamd file for amd64 fix by Marcin Sztolcman
[packages/exim.git] / exim4.conf
CommitLineData
a59efb33
AM
1######################################################################
2# Runtime configuration file for Exim #
3######################################################################
4
5
6# This is a default configuration file which will operate correctly in
7# uncomplicated installations. Please see the manual for a complete list
8# of all the runtime configuration options that can be included in a
9# configuration file. There are many more than are mentioned here. The
10# manual is in the file doc/spec.txt in the Exim distribution as a plain
11# ASCII file. Other formats (PostScript, Texinfo, HTML, PDF) are available
12# from the Exim ftp sites. The manual is also online at the Exim web sites.
13
14
15# This file is divided into several parts, all but the first of which are
16# headed by a line starting with the word "begin". Only those parts that
17# are required need to be present. Blank lines, and lines starting with #
18# are ignored.
19
20
21########### IMPORTANT ########## IMPORTANT ########### IMPORTANT ###########
22# #
23# Whenever you change Exim's configuration file, you *must* remember to #
24# HUP the Exim daemon, because it will not pick up the new configuration #
25# until you do. However, any other Exim processes that are started, for #
26# example, a process started by an MUA in order to send a message, will #
27# see the new configuration as soon as it is in place. #
28# #
29# You do not need to HUP the daemon for changes in auxiliary files that #
30# are referenced from this file. They are read every time they are used. #
31# #
32# It is usually a good idea to test a new configuration for syntactic #
33# correctness before installing it (for example, by running the command #
34# "exim -C /config/file.new -bV"). #
35# #
36########### IMPORTANT ########## IMPORTANT ########### IMPORTANT ###########
37
38
39
40######################################################################
41# MAIN CONFIGURATION SETTINGS #
42######################################################################
43
44# Specify your host's canonical name here. This should normally be the fully
45# qualified "official" name of your host. If this option is not set, the
46# uname() function is called to obtain the name. In many cases this does
47# the right thing and you need not set anything explicitly.
48
49# primary_hostname =
50
51
52# The next three settings create two lists of domains and one list of hosts.
53# These lists are referred to later in this configuration using the syntax
54# +local_domains, +relay_to_domains, and +relay_from_hosts, respectively. They
55# are all colon-separated lists:
56
57domainlist local_domains = @
58domainlist relay_to_domains =
59hostlist relay_from_hosts = 127.0.0.1
60
26d60792 61# If You wish to enable support for STARTTLS, uncomment folowing lines:
42952ff9 62
26d60792
ŁJM
63# tls_certificate = /etc/openssl/mail.crt
64# tls_privatekey = /etc/openssl/mail.key
65# tls_advertise_hosts = *
42952ff9 66
4fd05b1b
ŁJM
67# You can use self-signed cerficates (you will need openssl-tools package):
68
69# openssl genrsa -out /etc/openssl/mail.key 1024
70# openssl req -new -x509 -days 365 -key /etc/openssl/mail.key -out /etc/openssl/mail.crt
71
a59efb33
AM
72# Most straightforward access control requirements can be obtained by
73# appropriate settings of the above options. In more complicated situations, you
74# may need to modify the Access Control List (ACL) which appears later in this
75# file.
76
77# The first setting specifies your local domains, for example:
78#
79# domainlist local_domains = my.first.domain : my.second.domain
80#
81# You can use "@" to mean "the name of the local host", as in the default
82# setting above. This is the name that is specified by primary_hostname,
83# as specified above (or defaulted). If you do not want to do any local
26d60792 84# deliveries, remove the "@" from the setting above. If you want to accept mail
a59efb33
AM
85# addressed to your host's literal IP address, for example, mail addressed to
86# "user@[192.168.23.44]", you can add "@[]" as an item in the local domains
87# list. You also need to uncomment "allow_domain_literals" below. This is not
88# recommended for today's Internet.
89
90# The second setting specifies domains for which your host is an incoming relay.
91# If you are not doing any relaying, you should leave the list empty. However,
92# if your host is an MX backup or gateway of some kind for some domains, you
93# must set relay_to_domains to match those domains. For example:
94#
95# domainlist relay_to_domains = *.myco.com : my.friend.org
96#
97# This will allow any host to relay through your host to those domains.
98# See the section of the manual entitled "Control of relaying" for more
99# information.
100
101# The third setting specifies hosts that can use your host as an outgoing relay
102# to any other host on the Internet. Such a setting commonly refers to a
103# complete local network as well as the localhost. For example:
104#
105# hostlist relay_from_hosts = 127.0.0.1 : 192.168.0.0/16
106#
107# The "/16" is a bit mask (CIDR notation), not a number of hosts. Note that you
108# have to include 127.0.0.1 if you want to allow processes on your host to send
109# SMTP mail by using the loopback address. A number of MUAs use this method of
110# sending mail.
111
112
113# All three of these lists may contain many different kinds of item, including
114# wildcarded names, regular expressions, and file lookups. See the reference
115# manual for details. The lists above are used in the access control list for
116# incoming messages. The name of this ACL is defined here:
117
118acl_smtp_rcpt = acl_check_rcpt
119
120# You should not change that setting until you understand how ACLs work.
121
26d60792
ŁJM
122# The following ACL entries are used if you want to do content scanning with
123# the exiscan-acl patch. When you uncomment one of these lines, you must also
124# review the respective entries in the ACL section further below.
125
126# acl_smtp_mime = acl_check_mime
127# acl_smtp_data = acl_check_content
128
129# This configuration variable defines the virus scanner that is used with
130# the 'malware' ACL condition of the exiscan acl-patch. If you do not use
131# virus scanning, leave it commented. Please read doc/exiscan-acl-readme.txt
132# for a list of supported scanners.
133
134# av_scanner = sophie:/var/run/sophie
135
136# The following setting is only needed if you use the 'spam' ACL condition
137# of the exiscan-acl patch. It specifies on which host and port the SpamAssassin
138# "spamd" daemon is listening. If you do not use this condition, or you use
139# the default of "127.0.0.1 783", you can omit this option.
140
141# spamd_address = 127.0.0.1 783
a59efb33
AM
142
143# Specify the domain you want to be added to all unqualified addresses
144# here. An unqualified address is one that does not contain an "@" character
26d60792 145# followed by a domain. For example, "caesar@rome.example" is a fully qualified
a59efb33
AM
146# address, but the string "caesar" (i.e. just a login name) is an unqualified
147# email address. Unqualified addresses are accepted only from local callers by
148# default. See the recipient_unqualified_hosts option if you want to permit
149# unqualified addresses from remote sources. If this option is not set, the
150# primary_hostname value is used for qualification.
151
152# qualify_domain =
153
154
155# If you want unqualified recipient addresses to be qualified with a different
156# domain to unqualified sender addresses, specify the recipient domain here.
157# If this option is not set, the qualify_domain value is used.
158
159# qualify_recipient =
160
161
162# The following line must be uncommented if you want Exim to recognize
163# addresses of the form "user@[10.11.12.13]" that is, with a "domain literal"
164# (an IP address) instead of a named domain. The RFCs still require this form,
165# but it makes little sense to permit mail to be sent to specific hosts by
166# their IP address in the modern Internet. This ancient format has been used
167# by those seeking to abuse hosts by using them for unwanted relaying. If you
168# really do want to support domain literals, uncomment the following line, and
169# see also the "domain_literal" router below.
170
171# allow_domain_literals
172
173
174# No deliveries will ever be run under the uids of these users (a colon-
175# separated list). An attempt to do so causes a panic error to be logged, and
26d60792
ŁJM
176# the delivery to be deferred. This is a paranoic safety catch. There is an
177# even stronger safety catch in the form of the FIXED_NEVER_USERS setting
178# in the configuration for building Exim. The list of users that it specifies
179# is built into the binary, and cannot be changed. The option below just adds
180# additional users to the list. The default for FIXED_NEVER_USERS is "root",
181# but just to be absolutely sure, the default here is also "root".
182
183# Note that the default setting means you cannot deliver mail addressed to root
184# as if it were a normal user. This isn't usually a problem, as most sites have
185# an alias for root that redirects such mail to a human administrator.
186
a59efb33
AM
187never_users = root
188
189
190# The setting below causes Exim to do a reverse DNS lookup on all incoming
191# IP calls, in order to get the true host name. If you feel this is too
192# expensive, you can specify the networks for which a lookup is done, or
193# remove the setting entirely.
194
195host_lookup = *
196
197
198# The settings below, which are actually the same as the defaults in the
199# code, cause Exim to make RFC 1413 (ident) callbacks for all incoming SMTP
200# calls. You can limit the hosts to which these calls are made, and/or change
201# the timeout that is used. If you set the timeout to zero, all RFC 1413 calls
202# are disabled. RFC 1413 calls are cheap and can provide useful information
203# for tracing problem messages, but some hosts and firewalls have problems
204# with them. This can result in a timeout instead of an immediate refused
205# connection, leading to delays on starting up an SMTP session.
206
207rfc1413_hosts = *
208rfc1413_query_timeout = 30s
209
210
211# By default, Exim expects all envelope addresses to be fully qualified, that
212# is, they must contain both a local part and a domain. If you want to accept
213# unqualified addresses (just a local part) from certain hosts, you can specify
214# these hosts by setting one or both of
215#
216# sender_unqualified_hosts =
217# recipient_unqualified_hosts =
218#
219# to control sender and recipient addresses, respectively. When this is done,
220# unqualified addresses are qualified using the settings of qualify_domain
221# and/or qualify_recipient (see above).
222
223
224# If you want Exim to support the "percent hack" for certain domains,
225# uncomment the following line and provide a list of domains. The "percent
226# hack" is the feature by which mail addressed to x%y@z (where z is one of
227# the domains listed) is locally rerouted to x@y and sent on. If z is not one
228# of the "percent hack" domains, x%y is treated as an ordinary local part. This
229# hack is rarely needed nowadays; you should not enable it unless you are sure
230# that you really need it.
231#
232# percent_hack_domains =
233#
234# As well as setting this option you will also need to remove the test
235# for local parts containing % in the ACL definition below.
236
237
238# When Exim can neither deliver a message nor return it to sender, it "freezes"
239# the delivery error message (aka "bounce message"). There are also other
240# circumstances in which messages get frozen. They will stay on the queue for
241# ever unless one of the following options is set.
242
243# This option unfreezes frozen bounce messages after two days, tries
244# once more to deliver them, and ignores any delivery failures.
245
246ignore_bounce_errors_after = 2d
247
248# This option cancels (removes) frozen messages that are older than a week.
249
250timeout_frozen_after = 7d
251
252
253
254######################################################################
255# ACL CONFIGURATION #
256# Specifies access control lists for incoming SMTP mail #
257######################################################################
258
259begin acl
260
261# This access control list is used for every RCPT command in an incoming
262# SMTP message. The tests are run in order until the address is either
263# accepted or denied.
264
265acl_check_rcpt:
266
267 # Accept if the source is local SMTP (i.e. not over TCP/IP). We do this by
268 # testing for an empty sending host field.
269
270 accept hosts = :
271
26d60792
ŁJM
272 #############################################################################
273 # The following section of the ACL is concerned with local parts that contain
274 # @ or % or ! or / or | or dots in unusual places.
275 #
276 # The characters other than dots are rarely found in genuine local parts, but
277 # are often tried by people looking to circumvent relaying restrictions.
278 # Therefore, although they are valid in local parts, these rules lock them
279 # out, as a precaution.
280 #
281 # Empty components (two dots in a row) are not valid in RFC 2822, but Exim
282 # allows them because they have been encountered. (Consider local parts
283 # constructed as "firstinitial.secondinitial.familyname" when applied to
284 # someone like me, who has no second initial.) However, a local part starting
285 # with a dot or containing /../ can cause trouble if it is used as part of a
286 # file name (e.g. for a mailing list). This is also true for local parts that
287 # contain slashes. A pipe symbol can also be troublesome if the local part is
288 # incorporated unthinkingly into a shell command line.
289 #
290 # Two different rules are used. The first one is stricter, and is applied to
291 # messages that are addressed to one of the local domains handled by this
292 # host. It blocks local parts that begin with a dot or contain @ % ! / or |.
293 # If you have local accounts that include these characters, you will have to
294 # modify this rule.
295
296 deny message = Restricted characters in address
297 domains = +local_domains
298 local_parts = ^[.] : ^.*[@%!/|]
299
300 # The second rule applies to all other domains, and is less strict. This
301 # allows your own users to send outgoing messages to sites that use slashes
302 # and vertical bars in their local parts. It blocks local parts that begin
303 # with a dot, slash, or vertical bar, but allows these characters within the
304 # local part. However, the sequence /../ is barred. The use of @ % and ! is
305 # blocked, as before. The motivation here is to prevent your users (or
306 # your users' viruses) from mounting certain kinds of attack on remote sites.
307
a59efb33 308
26d60792
ŁJM
309 deny message = Restricted characters in address
310 domains = !+local_domains
311 local_parts = ^[./|] : ^.*[@%!] : ^.*/\\.\\./
312 #############################################################################
a59efb33
AM
313
314 # Accept mail to postmaster in any local domain, regardless of the source,
315 # and without verifying the sender.
316
317 accept local_parts = postmaster
318 domains = +local_domains
319
320 # Deny unless the sender address can be verified.
321
322 require verify = sender
323
324 #############################################################################
325 # There are no checks on DNS "black" lists because the domains that contain
326 # these lists are changing all the time. However, here are two examples of
327 # how you could get Exim to perform a DNS black list lookup at this point.
328 # The first one denies, while the second just warns.
329 #
330 # deny message = rejected because $sender_host_address is in a black list at $dnslist_domain\n$dnslist_text
331 # dnslists = black.list.example
332 #
333 # warn message = X-Warning: $sender_host_address is in a black list at $dnslist_domain
334 # log_message = found in $dnslist_domain
335 # dnslists = black.list.example
336 #############################################################################
337
338 # Accept if the address is in a local domain, but only if the recipient can
339 # be verified. Otherwise deny. The "endpass" line is the border between
340 # passing on to the next ACL statement (if tests above it fail) or denying
341 # access (if tests below it fail).
342
343 accept domains = +local_domains
344 endpass
a59efb33
AM
345 verify = recipient
346
347 # Accept if the address is in a domain for which we are relaying, but again,
348 # only if the recipient can be verified.
349
350 accept domains = +relay_to_domains
351 endpass
a59efb33 352 verify = recipient
a59efb33
AM
353 # If control reaches this point, the domain is neither in +local_domains
354 # nor in +relay_to_domains.
355
356 # Accept if the message comes from one of the hosts for which we are an
357 # outgoing relay. Recipient verification is omitted here, because in many
358 # cases the clients are dumb MUAs that don't cope well with SMTP error
359 # responses. If you are actually relaying out from MTAs, you should probably
360 # add recipient verification here.
361
362 accept hosts = +relay_from_hosts
363
364 # Accept if the message arrived over an authenticated connection, from
365 # any host. Again, these messages are usually from MUAs, so recipient
366 # verification is omitted.
367
368 accept authenticated = *
369
370 # Reaching the end of the ACL causes a "deny", but we might as well give
371 # an explicit message.
372
373 deny message = relay not permitted
374
26d60792
ŁJM
375# These access control lists are used for content scanning with the exiscan-acl
376# patch. You must also uncomment the entries for acl_smtp_data and acl_smtp_mime
377# (scroll up), otherwise the ACLs will not be used. IMPORTANT: the default entries here
378# should be treated as EXAMPLES. You MUST read the file doc/exiscan-acl-spec.txt
379# to fully understand what you are doing ...
380
381acl_check_mime:
382
383 # Decode MIME parts to disk. This will support virus scanners later.
384 warn decode = default
385
386 # File extension filtering.
387 deny message = Blacklisted file extension detected
388 condition = ${if match \
389 {${lc:$mime_filename}} \
390 {\N(\.exe|\.pif|\.bat|\.scr|\.lnk|\.com)$\N} \
391 {1}{0}}
392
393 # Reject messages that carry chinese character sets.
394 # WARNING: This is an EXAMPLE.
395 deny message = Sorry, noone speaks chinese here
396 condition = ${if eq{$mime_charset}{gb2312}{1}{0}}
397
398 accept
399
400acl_check_content:
401
402 # Reject virus infested messages.
403 deny message = This message contains malware ($malware_name)
404 malware = *
405
406 # Always add X-Spam-Score and X-Spam-Report headers, using SA system-wide settings
407 # (user "nobody"), no matter if over threshold or not.
408 warn message = X-Spam-Score: $spam_score ($spam_bar)
409 spam = nobody:true
410 warn message = X-Spam-Report: $spam_report
411 spam = nobody:true
412
413 # Add X-Spam-Flag if spam is over system-wide threshold
414 warn message = X-Spam-Flag: YES
415 spam = nobody
416
417 # Reject spam messages with score over 10, using an extra condition.
418 deny message = This message scored $spam_score points. Congratulations!
419 spam = nobody:true
420 condition = ${if >{$spam_score_int}{100}{1}{0}}
421
422 # finally accept all the rest
423 accept
a59efb33
AM
424
425
426######################################################################
427# ROUTERS CONFIGURATION #
428# Specifies how addresses are handled #
429######################################################################
430# THE ORDER IN WHICH THE ROUTERS ARE DEFINED IS IMPORTANT! #
431# An address is passed to each router in turn until it is accepted. #
432######################################################################
433
434begin routers
435
436# This router routes to remote hosts over SMTP by explicit IP address,
437# when an email address is given in "domain literal" form, for example,
438# <user@[192.168.35.64]>. The RFCs require this facility. However, it is
439# little-known these days, and has been exploited by evil people seeking
440# to abuse SMTP relays. Consequently it is commented out in the default
441# configuration. If you uncomment this router, you also need to uncomment
442# allow_domain_literals above, so that Exim can recognize the syntax of
443# domain literal addresses.
444
445# domain_literal:
446# driver = ipliteral
26d60792 447# domains = ! +local_domains
a59efb33
AM
448# transport = remote_smtp
449
450
451# This router routes addresses that are not in local domains by doing a DNS
26d60792
ŁJM
452# lookup on the domain name. Any domain that resolves to 0.0.0.0 or to a
453# loopback interface address (127.0.0.0/8) is treated as if it had no DNS
454# entry. Note that 0.0.0.0 is the same as 0.0.0.0/32, which is commonly treated
455# as the local host inside the network stack. It is not 0.0.0.0/0, the default
456# route. If the DNS lookup fails, no further routers are tried because of
457# the no_more setting, and consequently the address is unrouteable.
a59efb33
AM
458
459dnslookup:
460 driver = dnslookup
461 domains = ! +local_domains
462 transport = remote_smtp
26d60792 463 ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8
a59efb33
AM
464 no_more
465
466
467# The remaining routers handle addresses in the local domain(s).
468
469
26d60792
ŁJM
470# This router handles aliasing using a linearly searched alias file with the
471# name /etc/mail/aliases. When this configuration is installed automatically,
472# the name gets inserted into this file from whatever is set in Exim's
473# build-time configuration. The default path is the traditional /etc/aliases.
474# If you install this configuration by hand, you need to specify the correct
475# path in the "data" setting below.
a59efb33 476#
26d60792 477##### NB You must ensure that the alias file exists. It used to be the case
a59efb33
AM
478##### NB that every Unix had that file, because it was the Sendmail default.
479##### NB These days, there are systems that don't have it. Your aliases
480##### NB file should at least contain an alias for "postmaster".
481#
482# If any of your aliases expand to pipes or files, you will need to set
483# up a user and a group for these deliveries to run under. You can do
484# this by uncommenting the "user" option below (changing the user name
485# as appropriate) and adding a "group" option if necessary. Alternatively, you
486# can specify "user" on the transports that are used. Note that the transports
487# listed below are the same as are used for .forward files; you might want
488# to set up different ones for pipe and file deliveries from aliases.
489
490system_aliases:
491 driver = redirect
492 allow_fail
493 allow_defer
0e9140df 494 data = ${lookup{$local_part}lsearch{/etc/mail/aliases}}
a59efb33
AM
495# user = exim
496 file_transport = address_file
497 pipe_transport = address_pipe
498
499
500# This router handles forwarding using traditional .forward files in users'
501# home directories. If you want it also to allow mail filtering when a forward
2d7a5845
ŁJM
502# file starts with the string "# Exim filter" or "# Sieve filter", uncomment
503# the "allow_filter" option.
504
505# If you want this router to treat local parts with suffixes introduced by "-"
506# or "+" characters as if the suffixes did not exist, uncomment the two local_
507# part_suffix options. Then, for example, xxxx-foo@your.domain will be treated
508# in the same way as xxxx@your.domain by this router. You probably want to make
509# the same change to the localuser router.
a59efb33
AM
510
511# The no_verify setting means that this router is skipped when Exim is
512# verifying addresses. Similarly, no_expn means that this router is skipped if
513# Exim is processing an EXPN command.
514
515# The check_ancestor option means that if the forward file generates an
516# address that is an ancestor of the current one, the current one gets
517# passed on instead. This covers the case where A is aliased to B and B
518# has a .forward file pointing to A.
519
520# The three transports specified at the end are those that are used when
521# forwarding generates a direct delivery to a file, or to a pipe, or sets
522# up an auto-reply, respectively.
523
524userforward:
525 driver = redirect
526 check_local_user
2d7a5845
ŁJM
527# local_part_suffix = +* : -*
528# local_part_suffix_optional
a59efb33 529 file = $home/.forward
2d7a5845 530# allow_filter
a59efb33
AM
531 no_verify
532 no_expn
533 check_ancestor
a59efb33
AM
534 file_transport = address_file
535 pipe_transport = address_pipe
536 reply_transport = address_reply
537
3d67b043 538# Procmail. Uncomment following if you want procmail delivery.
539
540#procmail:
541# driver = accept
542# check_local_user
543# local_part_suffix = DSUFFIX*
544# local_part_suffix_optional
545# require_files = "${local_part}:+${home}/.procmailrc:\
546# +/usr/bin/procmail:!${home}/.forward"
547# transport = procmail_pipe
a59efb33 548
26d60792
ŁJM
549# This router matches local user mailboxes. If the router fails, the error
550# message is "Unknown user".
a59efb33 551
2d7a5845
ŁJM
552# If you want this router to treat local parts with suffixes introduced by "-"
553# or "+" characters as if the suffixes did not exist, uncomment the two local_
554# part_suffix options. Then, for example, xxxx-foo@your.domain will be treated
555# in the same way as xxxx@your.domain by this router.
556
a59efb33
AM
557localuser:
558 driver = accept
559 check_local_user
2d7a5845
ŁJM
560# local_part_suffix = +* : -*
561# local_part_suffix_optional
a59efb33 562 transport = local_delivery
26d60792
ŁJM
563 cannot_route_message = Unknown user
564
a59efb33
AM
565
566######################################################################
567# TRANSPORTS CONFIGURATION #
568######################################################################
569# ORDER DOES NOT MATTER #
570# Only one appropriate transport is called for each delivery. #
571######################################################################
572
573# A transport is used only when referenced from a router that successfully
574# handles an address.
575
576begin transports
577
578
579# This transport is used for delivering messages over SMTP connections.
580
581remote_smtp:
582 driver = smtp
583
584
585# This transport is used for local delivery to user mailboxes in traditional
586# BSD mailbox format. By default it will be run under the uid and gid of the
587# local user, and requires the sticky bit to be set on the /var/mail directory.
588# Some systems use the alternative approach of running mail deliveries under a
589# particular group instead of using the sticky bit. The commented options below
590# show how this can be done.
591
592local_delivery:
593 driver = appendfile
594 file = /var/mail/$local_part
595 delivery_date_add
596 envelope_to_add
597 return_path_add
29a901ea 598 group = mail
a59efb33
AM
599# mode = 0660
600
3d67b043 601# Procmail transport. Uncomment following if you want procmail delivery
602
603#procmail_pipe:
604# driver = pipe
605# command = "procmail -f-"
606# delivery_date_add
607# envelope_to_add
608# path = "/usr/local/bin:/usr/bin:/bin"
609# return_path_add
610# user = ${local_part}
611# temp_errors= 75 : 75 : 256
612# log_defer_output
613# log_fail_output
614
a59efb33
AM
615
616# This transport is used for handling pipe deliveries generated by alias or
617# .forward files. If the pipe generates any standard output, it is returned
618# to the sender of the message as a delivery error. Set return_fail_output
619# instead of return_output if you want this to happen only when the pipe fails
620# to complete normally. You can set different transports for aliases and
621# forwards if you want to - see the references to address_pipe in the routers
622# section above.
623
624address_pipe:
625 driver = pipe
626 return_output
627
628
629# This transport is used for handling deliveries directly to files that are
630# generated by aliasing or forwarding.
631
632address_file:
633 driver = appendfile
634 delivery_date_add
635 envelope_to_add
636 return_path_add
637
638
639# This transport is used for handling autoreplies generated by the filtering
640# option of the userforward router.
641
642address_reply:
643 driver = autoreply
644
645
646
647######################################################################
648# RETRY CONFIGURATION #
649######################################################################
650
651begin retry
652
653# This single retry rule applies to all domains and all errors. It specifies
654# retries every 15 minutes for 2 hours, then increasing retry intervals,
655# starting at 1 hour and increasing each time by a factor of 1.5, up to 16
656# hours, then retries every 6 hours until 4 days have passed since the first
657# failed delivery.
658
659# Domain Error Retries
660# ------ ----- -------
661
662* * F,2h,15m; G,16h,1h,1.5; F,4d,6h
663
664
665
666######################################################################
667# REWRITE CONFIGURATION #
668######################################################################
669
670# There are no rewriting specifications in this default configuration file.
671
672begin rewrite
673
674
675
676######################################################################
677# AUTHENTICATION CONFIGURATION #
678######################################################################
679
680# There are no authenticator specifications in this default configuration file.
681
682begin authenticators
683
42952ff9
ŁJM
684# Uncomment lines below to enable SMTP AUTH support. Be aware that this
685# requires cyrus-sasl-saslauthd package to be installed.
686
687# plain:
688# driver = plaintext
689# public_name = PLAIN
e794809d 690# server_prompts = :
1c679d11 691# server_condition = ${if saslauthd{{$2}{$3}{smtp}}{1}{0}}
42952ff9
ŁJM
692# server_set_id = $2
693#
694# login:
695# driver = plaintext
696# public_name = LOGIN
697# server_prompts = "Username:: : Password::"
698# server_condition = ${if saslauthd{{$1}{$2}{smtp}}{1}{0}}
699# server_set_id = $1
a59efb33
AM
700
701# End of Exim configuration file
This page took 0.121723 seconds and 4 git commands to generate.